Important Information

On August 12th, 2022, many of Keysight’s Network Test, Network Visibility, & Edge to Core (NAS/formerly Ixia) products will migrate to a new license structure.

CRITICAL: If you perform licensing operations after August 12th, 2022, without upgrading the licensing software to the latest version, licenses may not register properly, and some features may be missing. This could impact testing and result in downtime.

For details, click here.

Strike ID:
E20-0qvq1
CVSS:
7.5 (AV:N/AC:L/Au:N/C:P/I:P/A:P)
False Positive:
t
Variants:
2
Year:
2019

Description

This strike exploits a remote code execution vulnerability found in Apache Struts2 Framework. The vulnerability is due to the lack of input validation leading to a forced double Object Graph Navigation Library (OGNL) evaluation for raw user input. The vulnerability can be exploited by crafting a malicious HTTP POST request. Successful exploitation may result in executing arbitrarily code within the context of the user running the webservice.

CVE

References